Skip to content

Commit d2bd7b6

Browse files
committed
made changes to the README specific to new log4j action
1 parent 5d8333e commit d2bd7b6

File tree

1 file changed

+35
-1
lines changed

1 file changed

+35
-1
lines changed

README.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,35 @@
1-
# actions-log4j
1+
# SecureStack Log4j Vulnerability Analysis GitHub Action
2+
3+
A GitHub Action that analyses your java source code for all versions of the log4j vulnerability that affect both log4j 1.x and 2.x. You can read more about all versions of Log4j that are affected here: https://logging.apache.org/log4j/2.x/security.html
4+
5+
```
6+
name: Example Workflow Using the SecureStack log4j scanning Action
7+
on: push
8+
jobs:
9+
security:
10+
runs-on: ubuntu-latest
11+
steps:
12+
- name: log4j Scanning Step
13+
id: log4j
14+
uses: SecureStackCo/[email protected]
15+
with:
16+
securestack_api_key: ${{ secrets.SECURESTACK_API_KEY_SECRET }}
17+
securestack_app_id: ${{ secrets.SECURESTACK_APP_ID }}
18+
severity: critical
19+
```
20+
## Create your SecureStack API Key and save as GitHub Secret
21+
22+
1. Log in to [SecureStack](https://app.securestack.com) and go to the Profile -> GENERATE KEY screen.
23+
2. Generate an API key and copy the value.
24+
3. Go to Settings for your GitHub repository and click on Secrets at the bottom left.
25+
4. Create a new secret named SECURESTACK_API_KEY_SECRET and paste the value from step 2 into the field.
26+
27+
## Retreiving your SecureStack Application ID
28+
29+
1. Log in to [SecureStack](https://app.securestack.com).
30+
2. Open the application you wish to analyse.
31+
3. Copy the value of the application id on the View Application screen.
32+
4. Create a new secret named SECURESTACK_APP_ID and paste the value from step 3 into the field.
33+
34+
35+
Made with 💜 by [SecureStack](https://securestack.com)

0 commit comments

Comments
 (0)